D. N. Parmar and B. B. Mehta, Face Recognition Methods & Applications. Available from: arXiv

D. Gorodnichy, E. Granger, P. Radtke, C. S. Authority, and P. Meunier, Survey of Commercial Technologies for Face Recognition in Video

N. M. Duc and B. Q. Minh, Your Face is NOT Your Password Face Authentication ByPassing Lenovo-Asus-Toshiba

M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, D. Muntoni et al., Competition on counter measures to 2-D facial spoofing attacks, 2011 International Joint Conference on Biometrics (IJCB), pp.1-6, 2011.
DOI : 10.1109/IJCB.2011.6117509

I. Chingovska, A. Anjos, and S. , Anti-spoofing in Action: Joint Operation with a Verification System, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops
DOI : 10.1109/CVPRW.2013.22

J. Maatta, A. Hadid, and M. Pietikainen, Face spoofing detection from single images using micro-texture analysis, 2011 International Joint Conference on Biometrics (IJCB), pp.2011-2012, 2011.
DOI : 10.1109/IJCB.2011.6117510

I. Chingovska, A. Anjos, and S. , On the effectiveness of local binary patterns in face anti-spoofing, BIOSIG-Proceedings of the International Conference, pp.1-7, 2012.

M. Waris, H. Zhang, I. Ahmad, S. Kiranyaz, and M. Gabbouj, Analysis of textural features for face biometric anti-spoofing, 21st European Signal Processing Conference, pp.1-5, 2013.

X. Tan, Y. Li, J. Liu, and L. Jiang, Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model, pp.504-517, 2010.
DOI : 10.1007/978-3-642-15567-3_37

B. Peixoto, C. Michelassi, and A. Rocha, Face liveness detection under bad illumination conditions, 2011 18th IEEE International Conference on Image Processing, pp.3557-3560, 2011.
DOI : 10.1109/ICIP.2011.6116484

J. Galbally and S. , Face Anti-Spoofing Based on General Image Quality AssessmentIQA
DOI : 10.1109/icpr.2014.211

URL : http://atvs.ii.uam.es/files/2014_ICPR_AntiSpoofingFaceIQMs_Galbally.pdf

A. Anjos, M. Chakka, and S. , Motion-based counter-measures to photo attacks in face recognition, IET Biometrics, vol.3, issue.3, pp.147-158, 2014.
DOI : 10.1049/iet-bmt.2012.0071

T. I. Dhamecha, A. Nigam, R. Singh, and M. Vatsa, Disguise detection and face recognition in visible and thermal spectrums, 2013 International Conference on Biometrics (ICB), p.2013
DOI : 10.1109/ICB.2013.6613019

N. Kose and J. Dugelay, Countermeasure for the protection of face recognition systems against mask attacks, 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp.22-26, 2013.
DOI : 10.1109/FG.2013.6553761

Y. Kim, J. Na, S. Yoon, and J. Yi, Masked fake face detection using radiance measurements, Journal of the Optical Society of America A, vol.26, issue.4, pp.760-766, 2009.
DOI : 10.1364/JOSAA.26.000760

Z. Zhang, D. Yi, Z. Lei, and S. Z. Li, Face liveness detection by learning multispectral reflectance distributions, Face and Gesture 2011, pp.436-441, 2011.
DOI : 10.1109/FG.2011.5771438

K. Kollreider, H. Fronthaler, M. I. Faraj, and J. Bigun, Real-Time Face Detection and Motion Analysis With Application in ???Liveness??? Assessment, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.548-558902037, 2007.
DOI : 10.1109/TIFS.2007.902037

J. Li, Y. Wang, T. Tan, and A. K. Jain, Live face detection based on the analysis of fourier spectra, Defense and Security, pp.296-303, 2004.

G. Kim, S. Eum, J. K. Suhr, D. I. Kim, K. R. Park et al., Face liveness detection based on texture and frequency analyses, 2012 5th IAPR International Conference on Biometrics (ICB), pp.67-72, 2012.
DOI : 10.1109/ICB.2012.6199760

J. Bai, T. Ng, X. Gao, and Y. Shi, Is physics-based liveness detection truly possible with a single image?, Proceedings of 2010 IEEE International Symposium on Circuits and Systems, pp.3425-3428, 2010.
DOI : 10.1109/ISCAS.2010.5537866

N. Kose and J. Dugelay, Reflectance analysis based countermeasure technique to detect face mask attacks, 2013 18th International Conference on Digital Signal Processing (DSP), pp.1-6, 2013.
DOI : 10.1109/ICDSP.2013.6622704

J. Komulainen, A. Hadid, and M. Pietikäinen, Face Spoofing Detection Using Dynamic Texture, Computer Vision-ACCV 2012 Workshops, pp.146-157, 2013.
DOI : 10.1007/978-3-642-37410-4_13

S. Tirunagari, N. Poh, D. Windridge, A. Iorliam, N. Suki et al., Detection of Face Spoofing Using Visual Dynamics, IEEE Transactions on Information Forensics and Security, vol.10, issue.4, pp.762-777, 2015.
DOI : 10.1109/TIFS.2015.2406533

A. D. Pinto, H. Pedrini, W. Schwartz, and A. Rocha, Video-Based Face Spoofing Detection through Visual Rhythm Analysis, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images, pp.221-228, 2012.
DOI : 10.1109/SIBGRAPI.2012.38

URL : http://homepages.dcc.ufmg.br/%7Ewilliam/papers/paper_2012_SIBGRAPIA.pdf

A. Pinto, H. Pedrini, W. Schwartz, and A. Rocha, Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes, IEEE Transactions on Image Processing, vol.24, issue.12, 2015.
DOI : 10.1109/TIP.2015.2466088

W. Schwartz, A. Rocha, and H. Pedrini, Face spoofing detection through partial least squares and low-level descriptors, 2011 International Joint Conference on Biometrics (IJCB), pp.2011-2012, 2011.
DOI : 10.1109/IJCB.2011.6117592

URL : http://www.ic.unicamp.br/~rocha/pub/papers/2011-ijcb-spoofing-pls.pdf

R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena et al., Fusion of multiple clues for photo-attack detection in face recognition systems, 2011 International Joint Conference on Biometrics (IJCB), pp.2011-2012, 2011.
DOI : 10.1109/IJCB.2011.6117522

J. Yan, Z. Zhang, Z. Lei, D. Yi, and S. Z. Li, Face liveness detection by exploring multiple scenic clues, 2012 12th International Conference on Control Automation Robotics & Vision (ICARCV), pp.188-193, 2012.
DOI : 10.1109/ICARCV.2012.6485156

URL : http://www.cbsr.ia.ac.cn/users/jjyan/JJYAN-ICARCV2012.pdf

T. F. Pereira, A. Anjos, J. M. De-martino, and S. , Can face anti-spoofing countermeasures work in a real world scenario?, p.2013

J. Komulainen, A. Hadid, M. Pietikäinen, A. Anjos, and S. , Complementary countermeasures for detecting scenic face spoofing attacks, 2013 International Conference on Biometrics (ICB), p.2013
DOI : 10.1109/ICB.2013.6612968

URL : http://publications.idiap.ch/downloads/papers/2013/Komulainen_ICB_2013.pdf

J. Galbally, S. Marcel, and J. Fierrez, Biometric Antispoofing Methods: A Survey in Face Recognition, IEEE Access, vol.2, pp.1530-1552, 2014.
DOI : 10.1109/ACCESS.2014.2381273

S. Marcel, M. S. Nixon, and S. Z. Li, Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks, 2014.
DOI : 10.1007/978-1-4471-6524-8

G. Pan, L. Sun, Z. Wu, and S. Lao, Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera, 2007 IEEE 11th International Conference on Computer Vision, pp.1-8, 2007.
DOI : 10.1109/ICCV.2007.4409068

K. Kollreider, H. Fronthaler, and J. Bigun, Non-intrusive liveness detection by face images, Image Vis, Comput, vol.27, issue.3, pp.233-244, 2007.
DOI : 10.1016/j.imavis.2007.05.004

W. Bao, H. Li, N. Li, and W. Jiang, A liveness detection method for face recognition based on optical flow field, International Conference on Image Analysis and Signal Processing, pp.233-236, 2009.

A. Anjos and S. , Counter-measures to photo attacks in face recognition: A public database and a baseline, 2011 International Joint Conference on Biometrics (IJCB), pp.2011-2012, 2011.
DOI : 10.1109/IJCB.2011.6117503

I. Chingovska, The 2nd competition on counter measures to 2D face spoofing attacks, 2013 International Conference on Biometrics (ICB), p.2013
DOI : 10.1109/ICB.2013.6613026

M. D. Marsico, M. Nappi, D. Riccio, and J. Dugelay, Moving face spoofing detection via 3D projective invariants, 2012 5th IAPR International Conference on Biometrics (ICB), pp.2012-73, 2012.
DOI : 10.1109/ICB.2012.6199761

S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R. Singh, Computationally Efficient Face Spoofing Detection with Motion Magnification, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp.105-110, 2013.
DOI : 10.1109/CVPRW.2013.23

S. Bharadwaj, T. I. Dhamecha, M. Vatsa, and R. Singh, Face Anti-Spoofing via Motion Magnification and Multifeature Videolet Aggregation

T. A. Siddiqui, S. Bharadwaj, T. I. Dhamecha, A. Agarwal, M. Vatsa et al., Face anti-spoofing with multifeature videolet aggregation, 2016 23rd International Conference on Pattern Recognition (ICPR), p.2016
DOI : 10.1109/ICPR.2016.7899772

M. Waris, Securing Face Biometric Systems from Spoofing Attacks, 2014.

L. Feng, L. Po, Y. Li, X. Xu, F. Yuan et al., Integration of image quality and motion cues for face anti-spoofing: A neural network approach, Journal of Visual Communication and Image Representation, vol.38, pp.451-460, 2016.
DOI : 10.1016/j.jvcir.2016.03.019

K. Kollreider, H. Fronthaler, and J. Bigun, Verifying liveness by multiple experts in face biometrics, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.1-6, 2008.
DOI : 10.1109/CVPRW.2008.4563115

K. Lee, J. Ho, M. Yang, and D. Kriegman, Visual tracking and recognition using probabilistic appearance manifolds, Computer Vision and Image Understanding, vol.99, issue.3, pp.303-331, 2005.
DOI : 10.1016/j.cviu.2005.02.002

URL : http://vision.ai.uiuc.edu/mhyang/papers/cviu05a.pdf

J. M. Saragih, S. Lucey, and J. F. Cohn, Deformable Model Fitting by Regularized Landmark Mean-Shift, International Journal of Computer Vision, vol.27, issue.1, pp.200-215, 2010.
DOI : 10.1109/TPAMI.2005.3

H. Wu, M. Rubinstein, E. Shih, J. Guttag, F. Durand et al., Eulerian video magnification for revealing subtle changes in the world, ACM Transactions on Graphics, vol.31, issue.4, p.65, 2012.
DOI : 10.1145/2185520.2185561

R. Chaudhry, A. Ravichandran, G. Hager, and R. Vidal, Histograms of oriented optical flow and Binet-Cauchy kernels on nonlinear dynamical systems for the recognition of human actions, 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp.1932-1939, 2009.
DOI : 10.1109/CVPR.2009.5206821

T. Kobayashi and N. Otsu, Motion recognition using local auto-correlation of space?time gradients, Pattern Recogn, Lett, vol.33, issue.9, pp.1188-1195, 2012.

N. Erdogmus and S. , Spoofing 2D face recognition systems with 3D masks, 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), 2013, pp.1-8
DOI : 10.1109/tifs.2014.2322255

URL : https://infoscience.epfl.ch/record/198849/files/Erdogmus_IEEETIFS_2014.pdf

P. Ekman and W. Friesen, Facial Action Coding System: A Technique for the Measurement of Facial Movement

T. Edmunds and A. , Motion-based countermeasure against photo and video spoofing attacks in face recognition, Journal of Visual Communication and Image Representation, vol.50, pp.314-332, 2018.
DOI : 10.1016/j.jvcir.2017.12.004

URL : https://hal.archives-ouvertes.fr/hal-01577458

T. Baltru, P. Robinson, and L. , Morency, others, OpenFace: an open source facial behavior analysis toolkit, IEEE Winter Conference on Applications of Computer Vision (WACV), pp.1-10, 2016.

T. Baltrusaitis, P. Robinson, and L. Morency, Constrained Local Neural Fields for Robust Facial Landmark Detection in the Wild, 2013 IEEE International Conference on Computer Vision Workshops, pp.354-361, 2013.
DOI : 10.1109/ICCVW.2013.54

F. Perronnin and C. , Dance, Fisher kernels on visual vocabularies for image categorization, IEEE Conference on Computer Vision and Pattern Recognition, pp.1-8, 2007.
DOI : 10.1109/cvpr.2007.383266

URL : http://www.xrce.xerox.com/Publications/Attachments/2006-034/2006-034.pdf

F. Perronnin, J. Sánchez, and T. Mensink, Improving the Fisher Kernel for Large-Scale Image Classification, European Conference on Computer Vision, pp.143-156, 2010.
DOI : 10.1007/978-3-642-15561-1_11

URL : https://hal.archives-ouvertes.fr/inria-00548630

Z. Zhang, J. Yan, S. Liu, Z. Lei, D. Yi et al., A face antispoofing database with diverse attacks, 2012 5th IAPR International Conference on Biometrics (ICB), pp.2012-2038
DOI : 10.1109/ICB.2012.6199754

]. D. Wen, H. Han, and A. Jain, Face Spoof Detection With Image Distortion Analysis, IEEE Transactions on Information Forensics and Security, vol.10, issue.4, pp.746-761, 2015.
DOI : 10.1109/TIFS.2015.2400395

A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, The DET Curve in Assessment of Detection Task Performance, 1997.

Z. Boulkenafet, J. Komulainen, and A. Hadid, Face antispoofing using speeded-up Robust features and fisher vector encoding, IEEE Signal Process. Lett, vol.24, issue.2, pp.141-145, 2017.
DOI : 10.1109/lsp.2016.2630740

Z. Boulkenafet, J. Komulainen, and A. Hadid, Face Spoofing Detection Using Colour Texture Analysis, IEEE Transactions on Information Forensics and Security, vol.11, issue.8, pp.1818-1830, 2016.
DOI : 10.1109/TIFS.2016.2555286

Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, and A. Hadid, OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations, 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pp.612-618, 2017.
DOI : 10.1109/FG.2017.77

T. Edmunds and A. , Motion-based countermeasure against photo and video spoofing attacks in face recognition, Journal of Visual Communication and Image Representation, vol.50, pp.314-332, 2018.
DOI : 10.1016/j.jvcir.2017.12.004

URL : https://hal.archives-ouvertes.fr/hal-01577458